Re: Comments on draft-yourtchenko-colitti-nd-reduce-multicast

Erik Nordmark <nordmark@acm.org> Thu, 27 February 2014 19:13 UTC

Return-Path: <nordmark@acm.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1D231A0639 for <ipv6@ietfa.amsl.com>; Thu, 27 Feb 2014 11:13:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.235
X-Spam-Level:
X-Spam-Status: No, score=-1.235 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WIhzk73Ldrl0 for <ipv6@ietfa.amsl.com>; Thu, 27 Feb 2014 11:13:57 -0800 (PST)
Received: from c.mail.sonic.net (c.mail.sonic.net [64.142.111.80]) by ietfa.amsl.com (Postfix) with ESMTP id ACF941A0584 for <ipv6@ietf.org>; Thu, 27 Feb 2014 11:13:55 -0800 (PST)
Received: from [192.168.10.18] ([78.204.24.4]) (authenticated bits=0) by c.mail.sonic.net (8.14.4/8.14.4) with ESMTP id s1RJCmiE003092 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Thu, 27 Feb 2014 11:12:49 -0800
Message-ID: <530F8E33.2080109@acm.org>
Date: Thu, 27 Feb 2014 20:12:51 +0100
From: Erik Nordmark <nordmark@acm.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>, Erik Nordmark <nordmark@acm.org>, Ole Troan <otroan@employees.org>
Subject: Re: Comments on draft-yourtchenko-colitti-nd-reduce-multicast
References: <5305AF13.5060201@acm.org> <7461F3DA-FB05-400D-9C54-2F30C73DE2B9@employees.org> <530BCF83.4090500@acm.org> <1393319543.97599.YahooMailNeo@web162201.mail.bf1.yahoo.com> <530C7A37.2030706@acm.org> <1393447945.97980.YahooMailNeo@web162205.mail.bf1.yahoo.com>
In-Reply-To: <1393447945.97980.YahooMailNeo@web162205.mail.bf1.yahoo.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Sonic-ID: C;YhJJJeOf4xGvE7RWCY+HFQ== M;kOjpJeOf4xGvE7RWCY+HFQ==
Archived-At: http://mailarchive.ietf.org/arch/msg/ipv6/qdjR8IiPZV7OZeHheN7x2BlmbK8
Cc: Andrew Yourtchenko <ayourtch@cisco.com>, 6man WG <ipv6@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Feb 2014 19:13:58 -0000

On 2/26/14 9:52 PM, Mark ZZZ Smith wrote:
> The router would perform standard IPv6 forwarding, including TTL 
> decrement. Although Link-Locals currently won't use their default 
> gateway to reach other Link-Local destinations, if that was changed, I 
> think it is quite legal for a router to forward a link-local packet 
> back onto the same link (with a TTL decrement) - RFC4291 only 
> precludes them being forwarded onto a different link. 
That is correct - link locals can be forwarded out the same link.
I don't know if that is always a good idea for multicast packets - but 
if the router received the L3 multicast packet as a L2 unicast then it 
would make lots of sense to forward it back out on the link.
>> However, ttl decrements break the protocols that use the ttl=255 check
>> (and ND isn't the only protocol which does this.)
>>   
> That is a good point, one I hadn't considered. I'd be interested to know which non-ND protocols use the TTL=255 trick if you know them off of the top of your head. We might be lucky, the other ones which do use the TTL=255 trick might be ones that for security purposes we wouldn't want the default router to forward between hosts attached to the same link anyway.
I haven't tried to compile a list.
I know that routing protocols and VRRP does this (which is a reason why 
a "send link-locals to default router" should not be applied to the 
routers themselves.)

It doesn't look like mDNS uses it according to the RFC. It would be good 
to check this though.

>
> The use of the TTL=255 trick for ND would actually be useful for naturally preventing rogue RAs from the hosts - if the default router forwarded them to other hosts on the link, decrementing the TTL to 254, the receiving hosts should then ignore them.
Yes, for RAs it would help.
But if the hosts still send multicast NSs (e.g., for link-local 
targets), then the ttl decrement ensures that they will never get a 
response.

    Erik